
Sökresultat:
1941 Uppsatser om Network security and countermeasures - Sida 10 av 130
Utvärdering av SIEM-produkter
Denna rapport behandlar ett examensarbete med målet att hitta en paketering för resursövervakning i nätverk (NPMD - Network Performance Monitoring & Diagnostics) samt centraliserad logghantering (SIEM - Security Information & Event Management).Arbetet har utförts över fem veckor och bestod av att undersöka vilka produkter som kan vara möjliga att leverera till Ateas kunder genom att ta fram förslag på produkter och sedan utvärdera dessa i en virtuell testmiljö.Efter att två veckor av arbetet passerat beslutades att enbart SIEM-produkter skall utvärderas då vi annars inte kunnat hålla tidsramen på fem veckor. De första två veckorna bestod mestadels av efterforskning av olika produkter baserat på ett antal kriterier.Applikationen ska:? Stödja mallar och regler för Payment Card Industry Data Security Standard (PCI-DSS)? Stödja korrelering av händelser? Ej vara open source eller en hårdvarulösningUnder resterande tre veckor installerades, konfigurerades och utvärderades de produkter som var intressanta för ändamålet. Utvärderingen av produkternas funktioner och egenskaper utfördes i en virtuella miljö. Resultatet av testerna är ett dokument som innehåller information om varje produkts förmågor samt betyg på varje produkt.
Uppfångning och kvarhållning av 134Cs och 85Sr i olika växtutvecklingsstadier
Emissions of radionuclides to the atmosphere can lead to wet deposition on plants in the event of rainfall. An increased level of radioactivity in the plants may occur due to interception and retention of the radionuclides. If the content of the plants is above the threshold limit value, entire yields may have to be destroyed. In order to prevent contamination or decrease the content countermeasures can be taken. The impact of the
biomass, leaf area index (LAI) and growth stage of the plant on the interception and retention is important to know in order to decide which countermeasures to use.
Weather may also be an important factor.
In this work the interception and retention of 134Cs and 85Sr by spring wheat, ley and spring oil-seed rape was studied.
IT-säkerhet i små organisationer
IT- och informationssäkerhet är ett ständigt aktuellt ämnesområde. ITsäkerhetsarbetei små organisationer framstår som ett underforskat område. Föratt göra en kartläggning av hur arbete med risk, hot och säkerhet kan se ut i småorganisationer har vi genomfört en explorativ intervjustudie med representanterför små organisationer om deras arbete med IT- och informationssäkerhet. Vihar dessutom genomfört intervjuer med experter på området för att få ettbredare perspektiv. Tolkningen och analysen av intervjusvaren har utförtsgenom att först tolka svaren utifrån Security Controls och därefter analyserasvaren utifrån fem temaområden som vi funnit i materialet.
Familjen är den enda vägen tillbaka hem. : En kvalitativ studie om personalens syn på familjens delaktighet i behandling av ungdomar.
ÖREBRO UNIVERSITYDepartment of Behavioural, Social and Legal SciencesProgram of social workSocial Work CC-essay in Social Work, 15 creditsAutumn term 2013The family is the only way back home? A qualitative study on staff?s view on family involvement in the treatment of adolescentsAuthors: Cakici, Nahrin and Claesson, SandraAbstractThe aim of this study is to investigate how the staff at residential treatment centers works to involve the family and the social network in youth?s treatment and how they experience that the involvement affects the young person. The aim is also to study the difficulties the staff experience in their work to involve the family and the social network. In this study, staff from two residential treatment centers in Sweden participated. The study is conducted based in on qualitative method in which four semi-structured telephone interviews and one group interview have been conducted.
"...i en macho-stämpel så ingår det väl inte att plugga.." : En studie om betydelsen av genus och klass i en arbetsökningsprocess
The aim of this thesis is to study a job-searching process and elements that affects it. The elements I have focused on are gender, class and social network. The study is based on interviews and a survey study with students from the educational program of Social work (Socialomsorgsutbildningen), that graduated 3 years ago. Through the survey I have examined their social-background and their job-searching process. The interviews are the main focus in the study.
Finns kvinnor i säkerhetspolitik? : En undersökning av den svenska säkerhetiseringsprocessen avseende svenskt deltagande i den militära insatsen Minusma i Mali utifrån ett feministiskt perspektiv
Scientists argue that gender affects foreign policy and security policy, that ideas of gender are inconstant and that there is a lack of feminist perspectives in International Relations. The changes seen in the global security context may have challenged the way politicians and scientists understand war and its impacts, and led to increased gender awareness.Using securitization theory and feminist international relations theory, the aim is to examine how women and men are being spoken of in the Swedish foreign policy discourse regarding participation in the UN-led stabilization mission Minusma in Mali. By applying a feminist perspective on the securitization process, the intention is to increase the knowledge of whether there is gender awareness in this context.The result shows that there is limited gender awareness. There is minor consideration for the conflict?s different implications on the situation for women and men.
Människan och lärarprofessionen : En livsberättelse
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Koncern som tillväxtinkubator för småföretag : ? En fallstudie i ett shared service centers möjligheter attstödja entreprenöriella småföretag
???Information Technology is an essential part of the society today, not least in large ???organisations dealing with sensitive information. An example of such an organisation is the Swedish Armed Forces which indeed is in the need of ways to ensure information security in their Information Technology systems. The means which is used is an authorisation and accreditation process.All Information Technology systems go through a life cycle which includes realisation, usage, development and liquidation. In the Swedish Armed Forces the lifecycle is an authorisation process.
Veto: En motivanalys av FN:s säkerhetsråds fem permanenta medlemmars agerande i konflikten i Syrien.
Aim: The aim of this study is to analyse the possible motives behind the actions of the five permanent members of the UN Security Council in relation to the conflict in Syria. The background of this aim is the Arab Spring and the protests and violence that have followed the uprising. While, in Libya, the UN Security Council adopted resolutions that allowed sanctions against the Libyan government, no such resolutions have been adopted yet in Syria.Theory: The principal theory of the analysis is Stephen D. Krasner´s theory on sovereignty.Method: I have researched various resolutions and statements done in the Security Council, together with official statements from the actors, through Hadenius´ motive analysis methodology and Gilje & Grimen and Ödmans theories on hermeneutics.Conclusion: The conclusion of the analysis is that there, in the case of Syria and Libya, are two different parties in the Security Council. One that stands for sovereignty and one that stands for intervention.
Utvärdering av Near Field Communication och Certified Wireless USB: Säkerhet vid utveckling av applikationer
Today?s society is one where technological advances are made daily, which
increases the need to stop and assess the risks against users? integrity when
integrating new technology in contemporary systems all the greater. We have
taken two technologies, Near Field Communication and Certified Wireless USB,
whose envisioned area of use is to be integrated into mobile phones, and
evaluated what security threats are revealed for the respective technologies.
The threats against security have been identified through research of the
standards and existing reports for each technology. Practical experiments have
not been conducted on account of us not having access to any equipment to run
such trials.
Att tyda tecknen -En alternativ syn på förändringarna av Japans säkerhetspolitik
Japan's foreign and security policy has seen some substantial changes as a result of events like the first Gulf war and 9/11th. This has been taken as proof, by some, that Japan is abandoning its antimilitaristic stance and pursuing a more traditional hard power role through military means. This essay aims to explore if these shifts have coincided with any substantial shifts away from antimilitarism, which has had a strong influence on the country's security policy since the end of WW2.To do this I use constructivist theory, specifically regarding the impact of norms and identities on states security policy and briefly look into the problem of actor designation. The thematic focus is on security policy, from a narrow perspective, and thus I examine areas like the input and output to the Japanese military and the actual applications of this force. State identity is used to explore the prevalence of nationalistic sentiments and support for anti militarism in the public opinion and the political elite.The result of this study points to the further relevance of constructivist theory and especially the application of norms and identity.
Hörbarhet i praktiken : En Actor Network analys av arbetet kring hörbarhet
Abstrakt Tv-branschen är en jätteindustri som styrs av ett fåtal stora sändningsnätverk. I Sverige är den största distributören Sveriges Television (SVT) och på grund av detta så är sannolikheten att personer som arbetar inom ljud i Sverige någon gång kommer att arbeta på projekt för dem väldigt hög.I min uppsats har jag utfört en Actor Network-analys av empiriska studier jag utfört på postproduktionsbolaget Europa Sound and Vision. Med hjälp av analysen vill jag undersöka vad begreppet ?god hörbarhet? består av och därmed kunna definiera uttrycket tydligare.Jag jämför sedan SVTs syn på hörbarhet med den jag fått fram genom dessa studier för att till slut ändra på den nuvarande synen och på det regelverk SVT har..
Så designar du användarvänliga interna kommunikationsnätverk
Companys usually have intern communication platforms where employees can gather information and communicate with eachother. These networks are not public which leads to less resources spent on development. If this network is also used as a work tool may inadequate usability decrease work effeciency. Thats why we, by using known design principles, evaluated an already existing network of this kind along with interviews and think out loud tasks for users. Four users had to do some tasks while they explained how they went through step by step to solve those. This report culminates into a couple of guidelines which can be used to create a user friendly network. The problems that prevented users to feel in control when working resulted in the following guidelines: Create shortcuts of frequently used functions.
Athena - En intelligent och flexibel säkerhetslösning för transportbranschen
The project team has chosen to carry out the project itself. This is to be able to work more flexibly in the product development process and not be guided by some guidelines.Every day, we read in the media about a new truck burglary. The problem has become so common that we do not even notice it in the media. Each year the theft of 1 billion of Sweden and the entire 82 billion in Europe in 2008. This is an increase of 10 billion by 2007.
ISIT-modellen : Vägledning för att realisera en verksamhets informationssäkerhetsmål
The ISO standard ISO/IEC 17799/SS-627799-2 is a guidance for organizations to realize their information security goals. In spite of this standard, studies show flaws regarding information security in organizations. In particular flaws regarding overall view, knowledge and clear roles and responsibilities have been observed. The ISIT (Information Security Integrated Three level) model and its guidelines, developed in this thesis, help organizations to identify the required processes and procedures as well as the logical process flow. The thesis is based on theoretical studies and a case study within a multinational company.